{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T20:09:40Z","timestamp":1776370180353,"version":"3.51.2"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T00:00:00Z","timestamp":1717632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T00:00:00Z","timestamp":1717632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Infrastructure networks are critical components of contemporary society, and numerous approaches have been suggested for the selection of strategies to protect these networks. However, for uncertain environments, research on attack and defense game models for infrastructure networks is limited. Therefore, after reviewing the existing approaches, a method based on interval-valued intuitionistic fuzzy set (IVIFS) theory is proposed for attack and defense games in critical infrastructure networks. First, we present the process of constructing the game model proposed in this paper, which mainly includes the formulation of the cost model, the strategies, and the method of generating IVIFS payoffs. Next, the Nash equilibria of the game are identified by a pair of nonlinear programming models based on IVIFS theory. Finally, experiments are conducted on a target scale-free network, and an investigation into the variation patterns of the Nash equilibria under different circumstances is also conducted. We provide explanations for these variation patterns by considering payoffs from the perspective of mathematical programming models. Furthermore, we find that compared to the existing attack and defense game model with crisp payoffs, the model proposed in this paper leads to superior Nash equilibria. Our work is a preliminary attempt to analyse attack and defense games for infrastructure networks based on IVIFS theory, providing a method for assessing payoffs in uncertain environments for the attacker and defender. This topic deserves further study.<\/jats:p>","DOI":"10.1007\/s40747-024-01495-z","type":"journal-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T04:01:41Z","timestamp":1717646501000},"page":"6249-6265","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modelling attack and defense games in infrastructure networks with interval-valued intuitionistic fuzzy set payoffs"],"prefix":"10.1007","volume":"10","author":[{"given":"Yibo","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weili","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,6]]},"reference":[{"key":"1495_CR1","doi-asserted-by":"publisher","first-page":"3653225","DOI":"10.1155\/2022\/3653225","volume":"2022","author":"T Al-shami","year":"2022","unstructured":"Al-shami T, Ibrahim H, Azzam AA et al (2022) Sr-fuzzy sets and their weighted aggregated operators in application to decision-making. J Funct 2022:3653225. https:\/\/doi.org\/10.1155\/2022\/3653225","journal-title":"J Funct"},{"key":"1495_CR2","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s40747-022-00878-4","volume":"9","author":"TM Al-shami","year":"2023","unstructured":"Al-shami TM (2023) (2,1)-fuzzy sets: properties, weighted aggregated operators and their applications to multi-criteria decision-making methods. Complex Intell Syst 9:1687\u20131705. https:\/\/doi.org\/10.1007\/s40747-022-00878-4","journal-title":"Complex Intell Syst"},{"issue":"1","key":"1495_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/info14010056","volume":"14","author":"TM Al-shami","year":"2023","unstructured":"Al-shami TM, Mhemdi A (2023) Generalized frame for orthopair fuzzy sets: (m, n)-fuzzy sets and their applications to multi-criteria decision-making methods. Information 14(1):56. https:\/\/doi.org\/10.3390\/info14010056","journal-title":"Information"},{"key":"1495_CR4","doi-asserted-by":"publisher","first-page":"350","DOI":"10.5391\/IJFIS.2022.22.4.350","volume":"22","author":"TM Al-shami","year":"2022","unstructured":"Al-shami TM, Ibrahim HZ, Mhemdi A et al (2022) nth power root fuzzy sets and its topology. Int J Fuzzy Log Intell Syst 22:350\u2013365. https:\/\/doi.org\/10.5391\/IJFIS.2022.22.4.350","journal-title":"Int J Fuzzy Log Intell Syst"},{"issue":"2","key":"1495_CR5","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.3934\/math.2023155","volume":"8","author":"TM Al-shami","year":"2023","unstructured":"Al-shami TM, Alcantud JCR, Mhemdi A (2023) New generalization of fuzzy soft sets: (a, b)-fuzzy soft sets. AIMS Math 8(2):2995\u20133025. https:\/\/doi.org\/10.3934\/math.2023155","journal-title":"AIMS Math"},{"issue":"6794","key":"1495_CR6","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barab\u00e1si AL (2000) Error and attack tolerance of complex networks. Nature 406(6794):378\u2013382. https:\/\/doi.org\/10.1038\/35019019","journal-title":"Nature"},{"issue":"3","key":"1495_CR7","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/0165-0114(89)90205-4","volume":"31","author":"K Atanassov","year":"1989","unstructured":"Atanassov K, Gargov G (1989) Interval valued intuitionistic fuzzy sets. Fuzzy Sets Syst 31(3):343\u2013349. https:\/\/doi.org\/10.1016\/0165-0114(89)90205-4","journal-title":"Fuzzy Sets Syst"},{"issue":"1","key":"1495_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S0165-0114(86)80034-3","volume":"20","author":"KT Atanassov","year":"1986","unstructured":"Atanassov KT (1986) Intuitionistic fuzzy sets. Fuzzy Sets Syst 20(1):87\u201396. https:\/\/doi.org\/10.1016\/S0165-0114(86)80034-3","journal-title":"Fuzzy Sets Syst"},{"key":"1495_CR9","doi-asserted-by":"publisher","DOI":"10.1038\/srep16830","author":"H Azevedo","year":"2015","unstructured":"Azevedo H, Moreira-Filho CA (2015) Topological robustness analysis of protein interaction networks reveals key targets for overcoming chemotherapy resistance in glioma. Sci Rep. https:\/\/doi.org\/10.1038\/srep16830","journal-title":"Sci Rep"},{"issue":"5439","key":"1495_CR10","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512. https:\/\/doi.org\/10.1126\/science.286.5439.509","journal-title":"Science"},{"key":"1495_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2023.102012","volume":"69","author":"M Bernaschi","year":"2023","unstructured":"Bernaschi M, Celestini A, Cianfriglia M et al (2023) Seeking critical nodes in digraphs. J Comput Sci 69:102012. https:\/\/doi.org\/10.1016\/j.jocs.2023.102012","journal-title":"J Comput Sci"},{"key":"1495_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111603","volume":"153","author":"F Chaoqi","year":"2021","unstructured":"Chaoqi F, Pengtao Z, Lin Z et al (2021) Camouflage strategy of a stackelberg game based on evolution rules. Chaos, Solitons Fractals 153:111603. https:\/\/doi.org\/10.1016\/j.chaos.2021.111603","journal-title":"Chaos, Solitons Fractals"},{"key":"1495_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107958","volume":"216","author":"F Chaoqi","year":"2021","unstructured":"Chaoqi F, Yangjun G, Jilong Z et al (2021) Attack-defense game for critical infrastructure considering the cascade effect. Reliab Eng Syst Saf 216:107958. https:\/\/doi.org\/10.1016\/j.ress.2021.107958","journal-title":"Reliab Eng Syst Saf"},{"key":"1495_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121215","volume":"237","author":"X Cheng","year":"2024","unstructured":"Cheng X, Chen C (2024) Decision making with intuitionistic fuzzy best-worst method. Expert Syst Appl 237:121215. https:\/\/doi.org\/10.1016\/j.eswa.2023.121215","journal-title":"Expert Syst Appl"},{"key":"1495_CR15","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/S0378-4371(02)01545-5","volume":"320","author":"P Crucitti","year":"2003","unstructured":"Crucitti P, Latora V, Marchiori M et al (2003) Efficiency of scale-free networks: error and attack tolerance. Phys A 320:622\u2013642. https:\/\/doi.org\/10.1016\/S0378-4371(02)01545-5","journal-title":"Phys A"},{"key":"1495_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.106919","volume":"199","author":"H Dui","year":"2020","unstructured":"Dui H, Meng X, Xiao H et al (2020) Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game. Reliab Eng Syst Saf 199:106919. https:\/\/doi.org\/10.1016\/j.ress.2020.106919","journal-title":"Reliab Eng Syst Saf"},{"key":"1495_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.ijcip.2017.11.004","volume":"20","author":"L Faramondi","year":"2018","unstructured":"Faramondi L, Setola R, Panzieri S et al (2018) Finding critical nodes in infrastructure networks. Int J Crit Infrastruct Prot 20:3\u201315. https:\/\/doi.org\/10.1016\/j.ijcip.2017.11.004","journal-title":"Int J Crit Infrastruct Prot"},{"key":"1495_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100338","volume":"28","author":"L Faramondi","year":"2020","unstructured":"Faramondi L, Oliva G, Setola R (2020) Multi-criteria node criticality assessment framework for critical infrastructure networks. Int J Crit Infrastruct Prot 28:100338. https:\/\/doi.org\/10.1016\/j.ijcip.2020.100338","journal-title":"Int J Crit Infrastruct Prot"},{"issue":"2","key":"1495_CR19","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TCSS.2021.3099718","volume":"9","author":"Y Huang","year":"2021","unstructured":"Huang Y, Wu J, Chi KT et al (2021) Sequential attacker defender game on complex networks considering the cascading failure process. IEEE Trans Comput Soc Syst 9(2):518\u2013529. https:\/\/doi.org\/10.1109\/TCSS.2021.3099718","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"1495_CR20","doi-asserted-by":"publisher","first-page":"1272266","DOI":"10.1155\/2021\/1272266","volume":"2021","author":"HZ Ibrahim","year":"2021","unstructured":"Ibrahim HZ, Al-shami TM, Elbarbary OG (2021) (3, 2)-fuzzy sets and their applications to topology and optimal choices. Comput Intell Neurosci 2021:1272266. https:\/\/doi.org\/10.1155\/2021\/1272266","journal-title":"Comput Intell Neurosci"},{"key":"1495_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-01277-z","author":"HZ Ibrahim","year":"2023","unstructured":"Ibrahim HZ, Al-shami TM, Arar M et al (2023) $$k^{n}_{m}$$-rung picture fuzzy information in a modern approach to multi-attribute group decision-making. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-023-01277-z","journal-title":"Complex Intell Syst"},{"key":"1495_CR22","doi-asserted-by":"publisher","first-page":"1487724","DOI":"10.1155\/2023\/1487724","volume":"2023","author":"HZ Ibrahim","year":"2023","unstructured":"Ibrahim HZ, Al-shami TM, Mhemdi A (2023) Applications of nth power root fuzzy sets in multicriteria decision making. J Math 2023:1487724. https:\/\/doi.org\/10.1155\/2023\/1487724","journal-title":"J Math"},{"key":"1495_CR23","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1016\/j.ins.2022.12.025","volume":"624","author":"K Kumar","year":"2023","unstructured":"Kumar K, Chen SM (2023) Group decision making based on advanced interval-valued intuitionist fuzzy weighted averaging aggregation operator and score function of interval-valued intuitionist fuzzy values. Inf Sci 624:908\u2013923. https:\/\/doi.org\/10.1016\/j.ins.2022.12.025","journal-title":"Inf Sci"},{"issue":"2","key":"1495_CR24","doi-asserted-by":"publisher","first-page":"73","DOI":"10.4018\/IJORIS.2018040104","volume":"9","author":"PS Kumar","year":"2018","unstructured":"Kumar PS (2018) Linear programming approach for solving balanced and unbalanced intuitionistic fuzzy transportation problems. Int J Oper Res Inform Syst 9(2):73\u2013100. https:\/\/doi.org\/10.4018\/IJORIS.2018040104","journal-title":"Int J Oper Res Inform Syst"},{"issue":"3","key":"1495_CR25","doi-asserted-by":"publisher","first-page":"90","DOI":"10.4018\/IJORIS.2018070105","volume":"9","author":"PS Kumar","year":"2018","unstructured":"Kumar PS (2018) A simple and efficient algorithm for solving type-1 intuitionistic fuzzy solid transportation problems. Int J Oper Res Inform Syst 9(3):90\u2013122. https:\/\/doi.org\/10.4018\/IJORIS.2018070105","journal-title":"Int J Oper Res Inform Syst"},{"issue":"2","key":"1495_CR26","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4018\/IJORIS.2019040102","volume":"10","author":"PS Kumar","year":"2019","unstructured":"Kumar PS (2019) Psk method for solving mixed and type-4 intuitionistic fuzzy solid transportation problems. Int J Oper Res Inform Syst 10(2):20\u201353. https:\/\/doi.org\/10.4018\/IJORIS.2019040102","journal-title":"Int J Oper Res Inform Syst"},{"key":"1495_CR27","doi-asserted-by":"publisher","first-page":"149","DOI":"10.4018\/978-1-6684-8474-6.ch007","volume-title":"Transport and logistics planning and optimization","author":"PS Kumar","year":"2023","unstructured":"Kumar PS (2023) The psk method: A new and efficient approach to solving fuzzy transportation problems. Transport and logistics planning and optimization. IGI Global, Hershey, PA, pp 149\u2013197"},{"key":"1495_CR28","doi-asserted-by":"publisher","first-page":"352","DOI":"10.4018\/979-8-3693-0639-0.ch016","volume-title":"Using traditional design methods to enhance AI-driven decision making","author":"PS Kumar","year":"2024","unstructured":"Kumar PS (2024) Ai-driven decision support system for intuitionistic fuzzy assignment problems. Using traditional design methods to enhance AI-driven decision making. IGI Global, Hershey, PA, pp 352\u2013398. https:\/\/doi.org\/10.4018\/979-8-3693-0639-0.ch016"},{"key":"1495_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/978-1-6684-9130-0.ch001","volume-title":"Operational research for renewable energy and sustainable environments","author":"PS Kumar","year":"2024","unstructured":"Kumar PS (2024) Algorithms and software packages for solving transportation problems with intuitionistic fuzzy numbers. Operational research for renewable energy and sustainable environments. IGI Global, Hershey, PA, pp 1\u201355. https:\/\/doi.org\/10.4018\/978-1-6684-9130-0.ch001"},{"issue":"19","key":"1495_CR30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.87.198701","volume":"87","author":"V Latora","year":"2001","unstructured":"Latora V, Marchiori M (2001) Efficient behavior of small-world networks. Phys Rev Lett 87(19):198701. https:\/\/doi.org\/10.1103\/PhysRevLett.87.198701","journal-title":"Phys Rev Lett"},{"issue":"6","key":"1495_CR31","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1080\/23789689.2022.2126628","volume":"7","author":"C Lee","year":"2022","unstructured":"Lee C, Tien I (2022) Impacts of varying network parameters on the vulnerability and resilience of interdependent critical infrastructure systems. Sustain Resilient Infrastruct 7(6):984\u20131007. https:\/\/doi.org\/10.1080\/23789689.2022.2126628","journal-title":"Sustain Resilient Infrastruct"},{"issue":"6","key":"1495_CR32","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/TFUZZ.2010.2065812","volume":"18","author":"DF Li","year":"2010","unstructured":"Li DF (2010) Mathematical-programming approach to matrix games with payoffs represented by atanassov\u2019s interval-valued intuitionistic fuzzy sets. IEEE Trans Fuzzy Syst 18(6):1112\u20131128. https:\/\/doi.org\/10.1109\/TFUZZ.2010.2065812","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"1495_CR33","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/j.physa.2019.01.119","volume":"521","author":"Y Li","year":"2019","unstructured":"Li Y, Qiao S, Deng Y et al (2019) Stackelberg game in critical infrastructures from a network science perspective. Phys A 521:705\u2013714. https:\/\/doi.org\/10.1016\/j.physa.2019.01.119","journal-title":"Phys A"},{"issue":"5","key":"1495_CR34","doi-asserted-by":"publisher","DOI":"10.1063\/1.5029343","volume":"28","author":"YP Li","year":"2018","unstructured":"Li YP, Tan SY, Deng Y et al (2018) Attacker-defender game from a network science perspective. Chaos 28(5):051102. https:\/\/doi.org\/10.1063\/1.5029343","journal-title":"Chaos"},{"key":"1495_CR35","doi-asserted-by":"publisher","first-page":"56214","DOI":"10.1109\/ACCESS.2018.2872767","volume":"6","author":"YP Li","year":"2018","unstructured":"Li YP, Xiao Y, Li Y et al (2018) Which targets to protect in critical infrastructures-a game-theoretic solution from a network science perspective. IEEE Access 6:56214\u201356221. https:\/\/doi.org\/10.1109\/ACCESS.2018.2872767","journal-title":"IEEE Access"},{"issue":"6","key":"1495_CR36","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1007\/s11424-019-7420-0","volume":"32","author":"YP Li","year":"2019","unstructured":"Li YP, Deng Y, Xiao Y et al (2019) Attack and defense strategies in complex networks based on game theory. J Syst Sci Complex 32(6):1630\u20131640. https:\/\/doi.org\/10.1007\/s11424-019-7420-0","journal-title":"J Syst Sci Complex"},{"issue":"6","key":"1495_CR37","doi-asserted-by":"publisher","first-page":"5740","DOI":"10.1109\/TITS.2021.3057404","volume":"23","author":"S Liu","year":"2022","unstructured":"Liu S, Yin C, Chen D et al (2022) Cascading failure in multiple critical infrastructure interdependent networks of syncretic railway system. IEEE Trans Intell Transp Syst 23(6):5740\u20135753. https:\/\/doi.org\/10.1109\/TITS.2021.3057404","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1495_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119850","volume":"654","author":"W Mao","year":"2024","unstructured":"Mao W, Zhang K, Liu X et al (2024) An optimization-based three-way decision for multi-criteria ranking strategy considering intuitionistic fuzzy concept. Inf Sci 654:119850. https:\/\/doi.org\/10.1016\/j.ins.2023.119850","journal-title":"Inf Sci"},{"key":"1495_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126316","volume":"547","author":"A Mohammadzadeh","year":"2023","unstructured":"Mohammadzadeh A, Zhang C, Alattas KA et al (2023) Fourier-based type-2 fuzzy neural network: simple and effective for high dimensional problems. Neurocomputing 547:126316. https:\/\/doi.org\/10.1016\/j.neucom.2023.126316","journal-title":"Neurocomputing"},{"issue":"7563","key":"1495_CR40","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1038\/nature14604","volume":"524","author":"F Morone","year":"2015","unstructured":"Morone F, Makse HA (2015) Influence maximization in complex networks through optimal percolation. Nature 524(7563):65\u201368. https:\/\/doi.org\/10.1038\/nature14604","journal-title":"Nature"},{"issue":"1","key":"1495_CR41","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"JF Nash Jr","year":"1950","unstructured":"Nash JF Jr (1950) Equilibrium points in n-person games. Proc Natl Acad Sci U S A 36(1):48\u201349. https:\/\/doi.org\/10.1073\/pnas.36.1.48","journal-title":"Proc Natl Acad Sci U S A"},{"key":"1495_CR42","volume-title":"Theory of games and economic behavior","author":"JV Neumann","year":"1953","unstructured":"Neumann JV, Morgenstern O (1953) Theory of games and economic behavior. Princeton University Press, Princeton, USA"},{"key":"1495_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4991-8","volume-title":"Discrete mathematics and game theory","author":"G Owen","year":"1999","unstructured":"Owen G (1999) Discrete mathematics and game theory. Springer, New York"},{"issue":"1","key":"1495_CR44","doi-asserted-by":"publisher","first-page":"57","DOI":"10.3390\/e25010057","volume":"25","author":"G Qi","year":"2022","unstructured":"Qi G, Li J, Xu C et al (2022) Attack-defense game model with multi-type attackers considering information dilemma. Entropy 25(1):57. https:\/\/doi.org\/10.3390\/e25010057","journal-title":"Entropy"},{"issue":"11","key":"1495_CR45","doi-asserted-by":"publisher","DOI":"10.1063\/5.0112907","volume":"32","author":"G Qi","year":"2022","unstructured":"Qi G, Li J, Xu X et al (2022) An attack-defense game model in infrastructure networks under link hiding. Chaos 32(11):113109. https:\/\/doi.org\/10.1063\/5.0112907","journal-title":"Chaos"},{"issue":"3","key":"1495_CR46","first-page":"287","volume":"24","author":"F Smarandache","year":"2005","unstructured":"Smarandache F (2005) Neutrosophic set-a generalization of the intuitionistic fuzzy set. Int J Pure Appli Sci 24(3):287\u2013297","journal-title":"Int J Pure Appli Sci"},{"key":"1495_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109636","volume":"129","author":"A Taghieh","year":"2022","unstructured":"Taghieh A, Mohammadzadeh A, Zhang C et al (2022) A type-3 fuzzy control for current sharing and voltage balancing in microgrids. Appl Soft Comput 129:109636. https:\/\/doi.org\/10.1016\/j.asoc.2022.109636","journal-title":"Appl Soft Comput"},{"key":"1495_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/THS.2018.8574199","volume-title":"2018 IEEE International Symposium on Technologies for Homeland Security (HST)","author":"KH Thompson","year":"2018","unstructured":"Thompson KH, Tran HT (2018) Application of a defender-attacker-defender model to the us air transportation network. 2018 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE, Woburn, MA, USA, pp 1\u20135. https:\/\/doi.org\/10.1109\/THS.2018.8574199"},{"issue":"4","key":"1495_CR49","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1109\/TITS.2019.2909177","volume":"21","author":"KH Thompson","year":"2019","unstructured":"Thompson KH, Tran HT (2019) Operational perspectives into the resilience of the us air transportation network against intelligent attacks. IEEE Trans Intell Transp Syst 21(4):1503\u20131513. https:\/\/doi.org\/10.1109\/TITS.2019.2909177","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1495_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2022.100583","volume":"40","author":"S Wang","year":"2023","unstructured":"Wang S, Sun J, Zhang J et al (2023) Attack-defense game analysis of critical infrastructure network based on cournot model with fixed operating nodes. Int J Crit Infrastruct Prot 40:100583. https:\/\/doi.org\/10.1016\/j.ijcip.2022.100583","journal-title":"Int J Crit Infrastruct Prot"},{"issue":"6","key":"1495_CR51","doi-asserted-by":"publisher","DOI":"10.1063\/5.0046731","volume":"31","author":"ZG Wang","year":"2021","unstructured":"Wang ZG, Deng Y, Wang Z et al (2021) Disintegrating spatial networks based on rnegion centrality. Chaos 31(6):061101. https:\/\/doi.org\/10.1063\/5.0046731","journal-title":"Chaos"},{"key":"1495_CR52","doi-asserted-by":"publisher","unstructured":"Yager RR (2013) Pythagorean fuzzy subsets. In: 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA\/NAFIPS), pp 57\u201361, https:\/\/doi.org\/10.1109\/IFSA-NAFIPS.2013.6608375","DOI":"10.1109\/IFSA-NAFIPS.2013.6608375"},{"key":"1495_CR53","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L Zadeh","year":"1965","unstructured":"Zadeh L (1965) Fuzzy sets. Inform Control 8:338\u2013353. https:\/\/doi.org\/10.1016\/S0019-9958(65)90241-X","journal-title":"Inform Control"},{"key":"1495_CR54","doi-asserted-by":"publisher","unstructured":"Zeng C, Ren B, Li M et al (2019) Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective. Chaos 29(8):083129. https:\/\/doi.org\/10.1063\/1.5100849","DOI":"10.1063\/1.5100849"},{"issue":"9","key":"1495_CR55","doi-asserted-by":"publisher","first-page":"909","DOI":"10.3390\/e21090909","volume":"21","author":"CY Zeng","year":"2019","unstructured":"Zeng CY, Ren B, Liu H et al (2019) Applying the bayesian stackelberg active deception game for securing infrastructure networks. Entropy 21(9):909. https:\/\/doi.org\/10.3390\/e21090909","journal-title":"Entropy"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01495-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01495-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01495-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T15:09:35Z","timestamp":1726326575000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01495-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,6]]},"references-count":55,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1495"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01495-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,6]]},"assertion":[{"value":"29 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}